Page 107 - Cyber Terrorism and Extremism as Threat to Critical Infrastructure Protection
P. 107
METODI HADJI-JANEV: HYPER THREATS TO CRITICAL INFRASTRUCTURES IN THE REGION OF SOUTH-EASTERN EUROPE:
A WAKE-UP CALL FOR SOUTH-EASTERN EUROPEAN LEADERSHIP
7 References
1. Ackerman K. Robert, (February 8, 2018), “Hyperwar Is Coming Faster Than You Think”, Signal
AFCEA, accessed at: https://www.afcea.org/content/hyperwar-coming-faster-you-think
2. Alic, Anes, (November 01, 2011), III-Planned terror attack on US Embassy in Sarajevo, ISA Intel,
available at: . http://www.isaintel.com/2011/11/01/ill-planned-terror-attack-on-us-embassy-in-
sarajevo/
3. Allen R. John & Hussain Amir, (July 10, 2017), “On Hyperwar” Fortuna’s Corner, accessed at:
https://fortunascorner.com/2017/07/10/on-hyper-war-by-gen-ret-john-allenusmc-amir-hussain/,)
4. Badie Bertrand, (2012), “Transnationalizing Diplomacy and Global Governance” in Kerr, Pauline
& Wiseman, Geoffrey, (Eds.) Diplomacy in a Globalized world, Theories and Practices. Oxford
University Press.
5. Barton Tim, (2019), “AI offers the ability to reduce the cognitive burden on soldiers”, Video
interview with Sarah Sicarrd, C4ISRNET, accessed at: https://www.defencenews.com/vid-
eo/2019/10/21/ai-offers-the-ability-to-reduce-the-cognitive-burden-on-soldiers/
6. BBC, (June 27, 2010), “One Killed In Central Bosnia Bombing”, BBC News, retrieved February
2, from: http://www.bbc.co.uk/news/10428626
7. BBC, (July 19, 2012), Bulgaria Blast, Suicide bomber kills Israeli, BBC News, available at: http://
www.bbc.co.uk/news/world-europe-18897772
8. Berteau David, (May 15, 2018), “More signs pointing to AI’s growth in the federal market,” Wash-
ington Technology, accessed at: https://washingtontechnology.com/articles/2018/05/15/insights-
berteau-ai-trends-opportunity.aspx
9. Best L. Katharina, Schmid Jon, Tierney Shane, Awan Jalal, Beyene M Nahom, Holliday A. May-
nard, Khan Raza, Lee Karen, (2020) How to Analyze the Cyber Threat from Drones, RAND, ac-
cessed at: https://www.rand.org/pubs/research_reports/RR2972.html
10. Bodansky Yossef, (2001), Bin Laden: The Man Who Declared War on America. New York: Forum.
11. Bostrom Nick, (February 09, 2017), “Strategic Implications of Openness in AI Development”, Wi-
ley Online Library, accessed at: https://onlinelibrary.wiley.com/doi/full/10.1111/1758-5899.12403
12. Bur Jessie, (November 29, 2017), “IoT is changing the meaning of ‘critical infrastructure’”, Fed-
eral Times, accessed at: https://www.federaltimes.com/smr/cybercon/2017/11/29/iot-is-changing-
the-meaning-of-critical-infrastructure/
13. Chery Steve, (October 10, 2010), “How Stuxnet will rewrite the cyberterrorim playbook”, accessed
at: http://spectrum.ieee.org/podcast/telecom/security/how-stuxnet-is-rewriting-the-cyberterrorism-
playbook
14. Cyber edu, (2007), “Critical Infrastructure Protection Defined and Explained” accessed at: https://
www.forcepoint.com/cyber-edu/critical-infrastructure-protection-cip
15. Czarny Benny, (January 31, 2020), “ Embracing a Prevention Mindset to Protect Critical Infra-
structure”, DarkReading, accessed at: https://www.darkreading.com/vulnerabilities---threats/
embracing-a-prevention-mindset-to-protect-critical-infrastructure-/a/d-id/1336907
16. Dormehl Luke, (September 11, 2018), “The history of drones in 10 milestones” Digital Trends,
accessed at https://www.digitaltrends.com/cool-tech/history-of-drones/
17. Dimitrioska, Pandorce (April 13, 2012), Five murdered at Iron Lake, There are no suspects, (Origi-
nal: петтмина убиени кај Железарското Езеро, Осомничени нема), Alfa TV, available at: http://
www.time.mk/read/85fe05db07/a5bc958d44/index.html
107